Context analysis at an information handling system to manage authentication cycles
First Claim
Patent Images
1. An information handling system comprising:
- a housing;
a processor disposed in the housing and operable to process information;
memory disposed in the housing and interfaced with the processor, the memory operable to store the information;
a chipset disposed in the housing and interfaced with the processor and memory, the chipset having firmware to coordinate interactions between the processor and sensors;
plural sensors disposed in the housing and interfaced with the chipset, the plural sensors operable to sense plural conditions external to the housing;
plural sets of confidential information, each set of confidential information protected by at least one authentication protocol; and
a security processor interfaced with the chipset and the processor, the security processor selectively monitoring the plural conditions to selectively lock selected of the sets of confidential information currently authorized for access by the at least one authentication protocol, the security processor locking a first set of confidential information based upon a first time out period if monitoring by a first of the plural sensors and locking the first set of confidential information based upon a second time out period if monitoring by a second of the plural sensors; and
a security timer associated with the security processor, the security processor selectively locking selected sets of confidential information at predetermined time outs of the security timer, the predetermined time out period depending upon the type of sensor and condition currently monitored by the security processor;
wherein the security processor applies a first time out period to lock a first set of confidential information when monitoring by a camera and a second time out period to lock the first set of confidential information when monitoring by an accelerometer.
14 Assignments
0 Petitions
Accused Products
Abstract
Context captured with sensors of an information handling system is applied to selectively lock access to currently unlocked information, with conditions for locking access based upon the context. Nervous states enforce locking of selected information based upon the confidence of the security of the information under sensed external conditions. Increased sensitivity for locking access includes reduced timeouts to a lock command, increased response to sensed conditions, and more rapid response where unlocked access is to sensitive information.
-
Citations
12 Claims
-
1. An information handling system comprising:
-
a housing; a processor disposed in the housing and operable to process information; memory disposed in the housing and interfaced with the processor, the memory operable to store the information; a chipset disposed in the housing and interfaced with the processor and memory, the chipset having firmware to coordinate interactions between the processor and sensors; plural sensors disposed in the housing and interfaced with the chipset, the plural sensors operable to sense plural conditions external to the housing; plural sets of confidential information, each set of confidential information protected by at least one authentication protocol; and a security processor interfaced with the chipset and the processor, the security processor selectively monitoring the plural conditions to selectively lock selected of the sets of confidential information currently authorized for access by the at least one authentication protocol, the security processor locking a first set of confidential information based upon a first time out period if monitoring by a first of the plural sensors and locking the first set of confidential information based upon a second time out period if monitoring by a second of the plural sensors; and a security timer associated with the security processor, the security processor selectively locking selected sets of confidential information at predetermined time outs of the security timer, the predetermined time out period depending upon the type of sensor and condition currently monitored by the security processor; wherein the security processor applies a first time out period to lock a first set of confidential information when monitoring by a camera and a second time out period to lock the first set of confidential information when monitoring by an accelerometer. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method for securing an information handling system, the method comprising:
-
securing access to plural sets of confidential information through the information handling system with plural authentication protocols; authorizing access to the plural sets of confidential information with the plural protocols; monitoring conditions proximate the information handling system with selected of plural sensors disposed in the information handling system; and selectively removing authorization to access to selected of the sets of confidential information based upon the monitored conditions; wherein the monitored conditions that remove authorization depend at least in part on the number and types of the plural sensors selected to perform the monitoring conditions; and wherein monitoring conditions further comprises; monitoring only with touch sensors until touch sensor fail to detect touch for a predetermined time; monitoring only with optical sensors in response to failing to detect touch for the predetermined time until optical sensors fail to detect end user presence for a predetermined time; and monitoring only with RF sensors in response to failing to detect end user presence for the predetermined time. - View Dependent Claims (8, 9, 10, 11)
-
-
12. A method for securing an information handling system, the method comprising:
-
securing access to plural sets of confidential information through the information handling system with plural authentication protocols; authorizing access to the plural sets of confidential information with the plural protocols; monitoring conditions proximate the information handling system with selected of plural sensors disposed in the information handling system; and selectively removing authorization to access to selected of the sets of confidential information based upon the monitored conditions; wherein the monitored conditions that remove authorization depend at least in part on the number and types of the plural sensors selected to perform the monitoring conditions; wherein monitoring conditions further comprises; monitoring only with touch sensors until touch sensor fail to detect touch for a predetermined time; monitoring only with the touch sensors and with optical sensors in response to failing to detect touch for the predetermined time until optical sensors fail to detect end user presence for a predetermined time; and monitoring with touch sensors, optical sensors and RF sensors in response to failing to detect end user presence for the predetermined time.
-
Specification